[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4E059F4A.3050000@elektron.elka.pw.edu.pl>
Date: Sat, 25 Jun 2011 10:41:46 +0200
From: "wzabolot@...ktron.elka.pw.edu.pl" <W.Zabolotny@...a.pw.edu.pl>
To: LKML <linux-kernel@...r.kernel.org>
Subject: Re: Kernel 2.6.39.2 - incorrect calling of sleeping function and
lockdep problem found
I've experienced yet another bunch of errors when trying to boot
2.6.39.1 on the affected machine:
[ 128.020070] ERROR: kmemcheck: Fatal error
[ 128.024158]
[ 128.025654] Pid: 1100, comm: modprobe Tainted: G W 2.6.39.2
#1 /D865GBF
[ 128.036901] EIP: 0060:[<c0460871>] EFLAGS: 00010186 CPU: 0
[ 128.042468] EIP is at mutex_lock_nested+0xd1/0x340
[ 128.047332] EAX: f4b38230 EBX: f49d0214 ECX: f4b3c000 EDX: 0000403f
[ 128.053673] ESI: f49d0218 EDI: 00000246 EBP: f4b3ddf4 ESP: c083430c
[ 128.060092] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 128.065568] CR0: 8005003b CR2: f5c347d8 CR3: 34b31000 CR4: 000006d0
[ 128.071912] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 128.078253] DR6: ffff4ff0 DR7: 00000400
[ 128.082168] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 128.088007] [<c0127294>] kmemcheck_show+0x64/0x70
[ 128.092894] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 128.097954] [<c0122df0>] do_page_fault+0x270/0x440
[ 128.102927] [<c0462b63>] error_code+0x5f/0x64
[ 128.107554] [<c0249578>] reiserfs_write_lock+0x28/0x40
[ 128.112882] [<c022f1d9>] reiserfs_readdir_dentry+0x2f9/0x580
[ 128.118801] [<c022f477>] reiserfs_readdir+0x17/0x20
[ 128.123947] [<c01d463e>] vfs_readdir+0x9e/0xc0
[ 128.128581] [<c01d4720>] sys_getdents+0x60/0xc0
[ 128.133286] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 128.138432] [<ffffffff>] 0xffffffff
udevd[1093]: '/sbin/modprobe -b acpi:PNP0100:' [1100] terminated by
signal 5 (Trace/breakpoint trap)
[...]
[ 361.899981] kobject: 'vtcon0' (f5ceba08): fill_kobj_path: path =
'/devices/virtual/vtconsole/vtcon0'
[ 370.646704] ERROR: kmemcheck: Fatal error
[ 370.650782]
[ 370.652272] Pid: 1606, comm: path_id Tainted: G W 2.6.39.2
#1 /D865GBF
[ 370.663388] EIP: 0060:[<c021ceb2>] EFLAGS: 00010246 CPU: 0
[ 370.668946] EIP is at sysfs_refresh_inode+0x82/0xa0
[ 370.673887] EAX: f5c572e8 EBX: f58ae0b0 ECX: 00000000 EDX: 00000000
[ 370.680212] ESI: f5c574e0 EDI: f5c574e0 EBP: f3a55e10 ESP: c0834430
[ 370.686537] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 370.692003] CR0: 80050033 CR2: f5c347d8 CR3: 34a44000 CR4: 000006d0
[ 370.698328] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 370.704660] DR6: ffff4ff0 DR7: 00000400
[ 370.708558] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 370.714302] [<c0127294>] kmemcheck_show+0x64/0x70
[ 370.719181] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 370.724206] [<c0122df0>] do_page_fault+0x270/0x440
[ 370.729161] [<c0462b63>] error_code+0x5f/0x64
[ 370.733762] [<c021cf0b>] sysfs_permission+0x3b/0x70
[ 370.738813] [<c01cecc6>] link_path_walk+0x1c6/0x8d0
[ 370.743935] [<c01cf4f0>] path_lookupat+0x50/0x740
[ 370.748804] [<c01d0b75>] do_path_lookup+0x25/0x70
[ 370.753750] [<c01d0f3e>] user_path_at+0x3e/0x80
[ 370.758455] [<c01c80c1>] sys_readlinkat+0x31/0xa0
[ 370.763400] [<c01c8157>] sys_readlink+0x27/0x30
[ 370.768099] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 370.773141] [<ffffffff>] 0xffffffff
I attach gzipped messages from the whole booting (from serial console)
--
Regards,
WZab
Download attachment "2.6.39.2.panic.gz" of type "application/x-gzip" (17931 bytes)
Powered by blists - more mailing lists